PDF download Download Article PDF download Download Article

The Internet is an invaluable resource, but browsing the web can also leave you vulnerable to hackers, identity thieves, unscrupulous advertisers, and even government surveillance. If you’re interested in having an extra layer of privacy when you’re online, using a VPN , or virtual private network, may be a good option for you. VPNs work by routing your incoming and outgoing data through their own servers so that it’s not visible to anyone else who might be watching. Before you sign up for a VPN, though, it’s important to investigate your options and make sure you’re choosing one that’s safe, secure, and has all the features you need. [1]

Method 1
Method 1 of 2:

Selecting a Safe and Secure VPN

PDF download Download Article
  1. [2] Since the whole point of using a VPN is to protect your privacy and keep your personal information secure, it’s important to choose a service you can trust. Before you use a VPN, read reviews from as many sources as possible and check out how it’s rated on transparency and trustworthiness. [3]
    • The Wirecutter, a product review website owned by the New York Times, maintains a list of highly-rated VPNs: https://thewirecutter.com/reviews/best-vpn-service/ .
    • The Center for Democracy & Technology has a list of questions and answers from VPN providers that are meant to demonstrate their accountability and trustworthiness: https://cdt.org/insights/unedited-answers-signals-of-trustworthy-vpns/ .
    • Some VPN providers enlist independent third-party testing firms to audit their services. However, these reports can sometimes be biased. Check multiple reviews before deciding that a VPN is trustworthy based on a single audit. [4]
  2. When you use a VPN, your data is routed through the provider’s servers. This means that an unscrupulous VPN provider would be in a prime position to collect and exploit your data. [5] If a VPN promises not to log and sell your data, check that they are able to support these claims with independently published, fully accessible third-party security audits. [6]
    • Don’t take promises that a VPN won’t sell your data at face value. Many scam VPNs make false claims about how they use their customers’ data. Always look for third-party verification of these claims.
    • VPN providers that have been caught sharing customer data or violating their own privacy policies include EarthVPN, Onavo (a VPN offered by Facebook that has since been discontinued), and HideMyAss.
    • VPNs that have proven their claims not to log customer data include ExpressVPN, PIA, and Perfect Privacy.

    Warning: A major red flag that a VPN may be untrustworthy is if the provider isn’t willing to disclose who owns the company or where it is based. [7] TunnelBear and Mullvad have high ratings for ownership transparency, while ExpressVPN has raised concerns with some reviewers because they aren’t willing to reveal these details. [8]

    Advertisement
  3. Most VPNs collect and keep at least a small amount of data from their users. A trustworthy VPN should be open and honest about which data they keep and what they do with it. Be cautious of VPN providers that claim that they don’t keep any of your data. [9]
    • For example, most VPN providers keep information such as the personal data you provided when you originally signed up for the service, your true internet address or IP address (a number that helps identify your computer and your location within the network you’re using), and the timestamps for when you connect or disconnect from the VPN.
    • Look for VPN providers that offer regular transparency reports, such as TunnelBear, IVPN, and CyberGhost. [10]
  4. Some unscrupulous VPN providers make promises that turn out to be false or misleading. If a VPN provider makes claims upfront about their privacy and security, read over the fine print to make sure it matches.
    • The privacy policy should be clear and easy to understand. Watch out for vague or confusing language.
    • TunnelBear, Mullvad, and IVPN are all examples of VPN providers with fairly clear and readable privacy policies and terms of service. [11]
    • Hotspot Shield is an example of a VPN with marketing claims that contradict the fine print in its privacy policies, an issue highlighted in a complaint brought by the Center for Democracy & Technology before the Federal Trade Commission. [12]
  5. VPN security protocols translate your data into a format that can’t easily be read while it’s passing between your device and other locations online. A good VPN should have strong security protocols that ensure your information won’t be leaked in transit. [13] OpenVPN is a highly secure communication protocol that’s great to have if you’re using a PC or Mac computer, but not all smartphones support it. L2TP/IPsec is a good alternative protocol for mobile devices that don’t support OpenVPN. For the most flexibility, look for a VPN that has both. [14]
    • L2TP/IPsec is more vulnerable to security issues than OpenVPN, so it’s best to use OpenVPN if your device supports it. [15]
    • Stay away from VPNs like VyprVPN that use PPTP, an older protocol that is no longer secure.
  6. Reputable VPN providers tend to charge at least a small monthly fee for their services. Be wary of any VPN that’s completely free of charge, since this is often a sign that the provider is either making money off of your data or running an ad-based business. [16]
    • For example, one popular free VPN app, VPN Patron, is owned by a Hong Kong-based advertisement company that is known for monetizing its users’ data. [17]
    • Some trustworthy VPN providers, such as TunnelBear, offer a free trial period or provide a free version of the VPN that covers only a very limited amount of data per month (e.g., 500 MB). These can be useful for testing out the service before you commit.
    • Some IT security experts claim that not all free VPNs are untrustworthy, but you should always proceed with caution and do extensive research before trying one. [18]
  7. Before using a VPN service, look for transparency about where the service is based. The governments of some countries have a history of exploiting VPN services or forcing VPN providers to hand over their customers’ data. [19]
    • Russia, China, and Turkey all have a history of attempting to interfere with, seize, or exploit data from VPN providers. [20]
  8. Advertisement
Method 2
Method 2 of 2:

Choosing the Best Features

PDF download Download Article
  1. While it’s a good idea to steer clear of free VPNs, you don’t have to spring for the most expensive service on the market. [21] Once you find a few trustworthy potential VPN providers, compare their prices to see which option seems like the best deal.
    • Most VPNs cost around $4-$6 per month. They may charge more if you pay by the month instead of signing up for a full year.
    • Some providers allow you to sign up for a free trial or offer a free version with limited data. In some cases, you might also be able to get a refund if you aren’t satisfied with the service.
  2. A good VPN should be user-friendly, easy to set up, and simple to use. Try to find a VPN that stays on all the time once you set it up, or that you can easily turn on without having to log in every time. [22]
    • The disadvantage of more complicated VPNs, or those that require you to log in every time you want to use them, is that it’s easy to forget to activate them or to become frustrated and not bother. Choose a VPN that will give you security without the hassle.
    • TunnelBear is one of the easiest VPNs to set up and use. IVPN and Mullvad are also solid, user-friendly options. [23]
    • NordVPN also has strong ratings on ease of use, but has had some negative publicity due to a major security breach. [24]
  3. VPNs work by routing your data through their own servers. This means that the more servers the VPN has access to, the more quickly your data can move. VPNs with lots of servers are also less likely to throttle your bandwidth (the practice of intentionally slowing down connection speeds to reduce pressure on the network). [25] To avoid slow connection speeds, look for a VPN that has at least 75 server locations in at least 20 countries. [26]
    • Ideally, a VPN should have at least 1000 servers.
    • A higher number of servers doesn’t always guarantee the highest speeds. For example, TunnelBear has 4,000 servers, but it does not perform quite as well in speed tests as Mullvad, which has only 553 servers.
  4. Many VPNs feature a kill switch option, which allows you to shut off network traffic in and out of your device in case your connection is disrupted. This feature can help prevent you from becoming vulnerable to hackers in moments when your VPN stops securing your connection. Check that any VPN you choose has a kill switch that’s easy to access and activate. [27]
    • Additionally, your VPN software should alert you whenever there’s a problem or interruption in your secure connection.
    • The kill switch is a feature of most modern VPNs, including TunnelBear, Mullvad, and IVPN.
  5. At the very least, a VPN should protect your computer. However, it’s also a good idea to have VPN protection on your smart phone, tablet, and other devices that you use to browse the Internet. Look for a VPN that has apps or software that will cover all the devices you’d like to protect. [28]
    • Ideally, a VPN should work on multiple operating systems (such as Android, iOS, and less common operating systems).
    • Some VPNs, such as NordVPN and ExpressVPN, even have native apps for smart TVs!
  6. You’ll get the most protection out of your VPN if you’re able to easily reach out for help when you need it. Make sure your VPN provider offers email support with 24-hour turnaround at minimum, as well as a strong help section on their website or app. [29]
    • Ideally, your VPN provider should offer support chat or a toll-free customer service phone line.
  7. Some VPNs come with a variety of bonus features that you might find helpful. If you’re struggling to choose between 2 strong VPNs, check their list of extra features to help you decide which one would be more helpful to you. Bonus features may include: [30]
    • A variety of payment options, such as cash, PayPal, Amazon Pay, or cryptocurrency (such as bitcoin).
    • Stealth modes, which can help you get around networks that block VPNs.
    • Custom ad blockers.
    • Multihop connections, which can pass your data through multiple servers instead of just one for extra security. Keep in mind that using these connections will likely result in slower speeds.
  8. Advertisement

Expert Q&A

Search
Add New Question
  • Question
    Is using a VPN safe?
    Luigi Oppido
    Computer & Tech Specialist
    Luigi Oppido is the Owner and Operator of Pleasure Point Computers in Santa Cruz, California. Luigi has over 25 years of experience in general computer repair, data recovery, virus removal, and upgrades. He is also the host of the Computer Man Show! broadcasted on KSQD covering central California for over two years.
    Computer & Tech Specialist
    Expert Answer
    VPNs are fantastic if you trust the company that you're using. A VPN basically shifts your internet browsing from being secure with a little lock at the top of the browser or being secure within Google to being secure within another company that you are deciding to trust.
  • Question
    How do you know if a VPN is good?
    Luigi Oppido
    Computer & Tech Specialist
    Luigi Oppido is the Owner and Operator of Pleasure Point Computers in Santa Cruz, California. Luigi has over 25 years of experience in general computer repair, data recovery, virus removal, and upgrades. He is also the host of the Computer Man Show! broadcasted on KSQD covering central California for over two years.
    Computer & Tech Specialist
    Expert Answer
    Check that your VPN uses good security protocols. A great VPN will offer OpenVPN and L2TP/IPsec protocols. Additionally, the VPN you choose should promise not to back up or sell your data. Read reviews to make sure other people like your VPN.
  • Question
    What is VPN? What's its use?
    Community Answer
    VPN stands for Virtual Private Network. It is used to create a secure connection between two or more devices over the internet.
Ask a Question
      Advertisement

      Tips

      • While VPNs can give you an extra layer of privacy and security, they don’t guarantee anonymity online. If you’re interested in a service that can allow you to remain truly anonymous on the Internet, try Tor, a volunteer-run network that does not save any browsing or search history. [31] You can access Tor at https://www.torproject.org/ . However, keep in mind that Tor is not completely foolproof and has been targeted by hackers. [32] Many IT security experts recommend using it in combination with a VPN.
      • VPNs do not make already secure (HTTPS) connections to websites any more secure; rather they stop ISPs from seeing which websites you visit.
      Submit a Tip
      All tip submissions are carefully reviewed before being published
      Name
      Please provide your name and last initial
      Thanks for submitting a tip for review!
      Advertisement
      1. https://thewirecutter.com/reviews/best-vpn-service/
      2. https://thewirecutter.com/reviews/best-vpn-service/#trusting-a-vpn
      3. https://cdt.org/wp-content/uploads/2017/08/FTC-CDT-VPN-complaint-8-7-17.pdf
      4. Luigi Oppido. Computer & Tech Specialist. Expert Interview. 31 July 2019.
      5. https://www.cnet.com/how-to/understanding-vpns-and-how-to-choose-one/
      6. https://thewirecutter.com/reviews/best-vpn-service/
      7. https://slate.com/technology/2019/02/best-vpn-companies-trust-privacy.html
      8. https://hackernoon.com/whos-really-behind-the-world-s-most-popular-free-vpns-d74bafc82178
      9. https://www.consumerreports.org/privacy/how-to-choose-a-vpn-for-digital-privacy-and-security/
      10. https://www.wyden.senate.gov/imo/media/doc/052819%20DHS%20Response%20to%20Wyden%20Letter%20RE%20Chinese%20Russian%20VPN.pdf
      11. https://slate.com/technology/2019/02/best-vpn-companies-trust-privacy.html
      12. https://www.consumerreports.org/privacy/how-to-choose-a-vpn-for-digital-privacy-and-security/
      13. https://www.consumerreports.org/privacy/how-to-choose-a-vpn-for-digital-privacy-and-security/
      14. https://thewirecutter.com/reviews/best-vpn-service/
      15. https://www.pcmag.com/picks/the-best-vpn-services
      16. https://www.cnet.com/how-to/understanding-vpns-and-how-to-choose-one/
      17. https://thewirecutter.com/reviews/best-vpn-service/
      18. https://www.pcmag.com/picks/the-best-vpn-services
      19. https://www.vpnmentor.com/blog/the-best-vpns-for-multiple-devices-and-connections/
      20. https://www.pcmag.com/picks/the-best-vpn-services
      21. https://www.pcmag.com/picks/the-best-vpn-services
      22. https://thewirecutter.com/reviews/best-vpn-service/
      23. https://www.washingtonpost.com/news/the-switch/wp/2014/12/26/the-hackers-who-say-they-took-down-gaming-networks-are-now-going-after-tor/?arc404=true

      About This Article

      Thanks to all authors for creating a page that has been read 49,315 times.

      Is this article up to date?

      Advertisement